Guardicore Discovers SSH Targeting Botnet: Telecom Infrastructure A Target (Along With Financial Systems)

Guardicore Discovers SSH Targeting Botnet: Telecom Infrastructure A Target (Along With Financial Systems)

via Ophir Harpaz, writing at the Guardicore Blog comes highly concerning news of a nascent SSH botnet discovery by the security professionals at Guardicore, dubbed FritzFrog. Today's Must Read! ...
via     Terena.org

Using Similar Taxonomies To Understand Present And Future Security Challenges

via Terena.org In what is certainly the single most fascinating and well-crafted piece on the taxonomy of organized crime in months; and it's present and future significance for information and cyber security ...
FCC Follies: The 20 Year Chinese Communist Monitoring Fail

FCC Follies: The 20 Year Chinese Communist Monitoring Fail

via Jon Brodkin, plying the writing trade at our beloved Ars Technica, comes this tale of the Federal Communications Commission's latest fail of note. This time, with the Communist Chinese. Read the ...
Marc Tobias On Apple Inc.'s Siri Promises

Marc Tobias On Apple Inc.’s Siri Promises

View fullsize via Marc Weber Tobias, writing at Forbes, comes this superlative piece detailing consent inconsistency and other fundamental legal problems with Apple Inc.'s (NASDAQ: AAPL) Siri personal assistant. Todays Must Read ...
Knot's Landed: Conway's Knot Problem Solved

Knot’s Landed: Conway’s Knot Problem Solved

View fullsize via Quanta Magazine's Erica Klarreich, comes the story of Lisa Piccirillo's solution to Conway's Knot Problem. Behold, Ms. Piccirillo's proof. Today's MustRead. 'In the summer of 2018, at a conference ...
Image Via

New APT Report: The Unknown Knowns

View fullsize Image Via via the erudite Catalin Cimpanu (formerly reporting at BleepingComputer, now writing at ZDNet's ZDNet's ZeroDay blog) comes well-crafted and detailed reporting, targeting the recent identification of APT group ...
Zooms' Security Fails Common Knowledge To The Company's 'Partners'

Zooms’ Security Fails Common Knowledge To The Company’s ‘Partners’

View fullsize Begs the question as how effective the company's 'Business Partners' security programs were, as well. Today's Must Read via The New York Times journalists Natasha Singer and Nicole Perlroth ...
Villainy Of The Most Atrocious Sort

Villainy Of The Most Atrocious Sort

via Raphael Satter, Jack Stubbs and Christopher Bing, writing at Reuters comes this well-crafted reportage, detailing a new malicous attack on the World Health Organization and mounted by currently-surveilled foul-villains-of-the-cyber-kind. Most Assuredly ...
Douglas J. Leith, PhD: 'Web Browser Privacy: What Do Browsers Say When The Phone Home?'

Douglas J. Leith, PhD: ‘Web Browser Privacy: What Do Browsers Say When The Phone Home?’

A new (published February 24th, 2020) study - targeting web browser chattiness and privacy (whatever may be left, i.e.). Comprised of highly detailed data, and authored by Professor Douglas J. Leith PhD, ...
6455519_preview.png

POTS – Protective Optimization Technologies: May The Algorithm Be With You

via Adrian Colyer (a Venture Partner at London, UK ensconced Accel, and writing at The Morning Paper comes a sperlative analysis of this outstanding scholarly paper entitled POTS: Protective Optimization Technologies - ...

Secure Guardrails